Attack vector

An attack vector is nothing but a path taken by the attacker in order to successfully exploit the vulnerability. The attack vector metric indicates the possible ways in which vulnerability could be exploited. The number of potential attackers for a vulnerability that could be exploited remotely over the Internet is comparatively more than the number of attackers that could exploit a vulnerability requiring physical access to a device, hence the metric value would be larger the more remote the attacker could be in order to exploit the vulnerability:

Parameter

Description

Example

Network

Vulnerability could be exploited remotely over the network. The vulnerable component is connected to the network and the attacker could access it through layer 3 (OSI).

Denial of service caused by sending a specially crafted TCP packet

Adjacent

Vulnerability could be exploited within the same physical or logical network. It cannot be exploited beyond the network boundary.

Bluejacking attack, ARP flooding

Local

The vulnerable component is not connected to the network by any means and the attacker has to be locally logged in in order to exploit the vulnerability.

Privilege escalation

Physical

Vulnerability could only be exploited if the attacker has physical access to the vulnerable system/component.

Cold boot attack

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.230.107